{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T22:20:45Z","timestamp":1759962045490,"version":"3.38.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,7]]},"DOI":"10.1109\/isi.2011.5984061","type":"proceedings-article","created":{"date-parts":[[2011,8,16]],"date-time":"2011-08-16T19:28:09Z","timestamp":1313522889000},"page":"119-124","source":"Crossref","is-referenced-by-count":10,"title":["Leveraging social networks to detect anomalous insider actions in collaborative environments"],"prefix":"10.1109","author":[{"given":"You","family":"Chen","sequence":"first","affiliation":[]},{"given":"Steve","family":"Nyemba","sequence":"additional","affiliation":[]},{"given":"Wen","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Bradley","family":"Malin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)01009-X"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/383775.383777"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/371920.372071"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-005-7988-x"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956831"},{"key":"13","article-title":"Governance in social media: A case study of the Wikipedia promotion process","author":"leskovec","year":"2010","journal-title":"CWSM"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2011.01.007"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICALT.2007.6"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1377836.1377854"},{"key":"21","first-page":"172","article-title":"A novel anomaly detection scheme based on principal component classifier","author":"shyu","year":"2003","journal-title":"ICDM"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2010\/10\/P10020"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2005.103"},{"key":"23","first-page":"166","article-title":"Task-based authorization controls (tbac): A family of models for active and enterprise-oriented autorization management","author":"thomas","year":"1997","journal-title":"IFfP [CDS]"},{"key":"24","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1145\/586110.586145","article-title":"Mimicry attacks on host-based intrusion detection systems","author":"wagner","year":"2002","journal-title":"CCS"},{"key":"25","first-page":"101","article-title":"Injecting a permission-based delegation model to secure web-based workflow systems","author":"wang","year":"2009","journal-title":"ISI"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1201\/9781420067248"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1007\/11760146_11"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/937527.937530"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1943513.1943524"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-006-0023-0"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1377\/hlthaff.24.5.1103"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-8733(03)00009-1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.aos.2009.07.005"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2009.5137304"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2009.5137280"},{"key":"4","first-page":"153","article-title":"Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System","volume":"lncs4318","author":"chen","year":"2006","journal-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2007.11.011"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/373256.373259"}],"event":{"name":"2011 IEEE International Conference on Intelligence and Security Informatics (ISI 2011)","start":{"date-parts":[[2011,7,10]]},"location":"Beijing, China","end":{"date-parts":[[2011,7,12]]}},"container-title":["Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5975309\/5983989\/05984061.pdf?arnumber=5984061","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,8]],"date-time":"2025-03-08T20:40:55Z","timestamp":1741466455000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5984061\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/isi.2011.5984061","relation":{},"subject":[],"published":{"date-parts":[[2011,7]]}}}